Third-party risks overwhelm traditional ERM setups

Enterprise risk management (ERM) teams are struggling to effectively mitigate third-party risk in an increasingly interconnected business environment, according to Gartner. ERM struggles to elevate the right issues In a Gartner survey of 100 executive risk committee members in September 2022, 84% of respondents said that third-party risk “misses” resulted in operations disruptions. “Most organizations […]

Continue Reading

Combining identity and security strategies to mitigate risks

Last week, the Identity Defined Security Alliance (IDSA), a nonprofit that provides vendor-neutral resources to help organizations reduce the risk of a breach by combining identity and security strategies, announced Jeff Reich as the organization’s new Executive Director. This was the perfect opportunity to talk with Jeff. In this Help Net Security interview, you can […]

Continue Reading

As regulations skyrocket, is compliance even possible anymore?

Let’s face it, security teams are only as good as the next problem they face. But why is keeping up so difficult? New/evolving requirements, lengthy/confusing acronyms, and countless moving parts plague compliance regulations. In this Help Net Security video, Gianna Price, Solutions Architect at Telos Corporation, explores what organizations can do to streamline compliance and […]

Continue Reading

Can we predict cyber attacks? Bfore.AI says they can

Recently, at Cybertech Tel Aviv 2023, I met with Luigi Lenguito, CEO at Bfore.AI, who introduced me to their technology. In this Help Net Security interview, Lenguito talks about threat prevention challenges and how his company can predict cyber attacks before they begin. What are today’s main threat prevention challenges for large organizations? The vast […]

Continue Reading

Balancing risk and security tradeoffs

In this Help Net Security video, Christopher Hodson, CSO at Cyberhaven, talks about how CISOs have been investing in inflating their tech stack, but for what? No amount of acronyms will do any good if stuff is leaking from within. Classifying files and data would enable companies to understand what data is necessary and focus […]

Continue Reading